Intelligent OS X Malware Threat Detection with Code Inspection

Total Page:16

File Type:pdf, Size:1020Kb

Intelligent OS X Malware Threat Detection with Code Inspection This is a repository copy of Intelligent OS X malware threat detection with code inspection. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/128371/ Version: Published Version Article: Pajouh, H.H., Dehghantanha, A. orcid.org/0000-0002-9294-7554, Khayami, R. et al. (1 more author) (2018) Intelligent OS X malware threat detection with code inspection. Journal of Computer Virology and Hacking Techniques, 14 (3). pp. 213-223. ISSN 2274-2042 https://doi.org/10.1007/s11416-017-0307-5 Reuse This article is distributed under the terms of the Creative Commons Attribution (CC BY) licence. This licence allows you to distribute, remix, tweak, and build upon the work, even commercially, as long as you credit the authors for the original work. More information and the full terms of the licence here: https://creativecommons.org/licenses/ Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ J Comput Virol Hack Tech DOI 10.1007/s11416-017-0307-5 ORIGINAL PAPER Intelligent OS X malware threat detection with code inspection Hamed Haddad Pajouh1 · Ali Dehghantanha2 · Raouf Khayami1 · Kim-Kwang Raymond Choo3,4 Received: 31 July 2017 / Accepted: 27 September 2017 © The Author(s) 2017. This article is an open access publication Abstract With the increasing market share of Mac OS X over 91% detection accuracy with 3.9% false alarm rate. operating system, there is a corresponding increase in the We also utilize Synthetic Minority Over-sampling Technique number of malicious programs (malware) designed to exploit (SMOTE) to create three synthetic datasets with different dis- vulnerabilities on Mac OS X platforms. However, existing tributions based on the refined version of collected dataset to manual and heuristic OS X malware detection techniques investigate impact of different sample sizes on accuracy of are not capable of coping with such a high rate of malware. malware detection. Using SMOTE datasets we could achieve While machine learning techniques offer promising results over 96% detection accuracy and false alarm of less than 4%. in automated detection of Windows and Android malware, All malware classification experiments are tested using cross there have been limited efforts in extending them to OS X validation technique. Our results reflect that increasing sam- malware detection. In this paper, we propose a supervised ple size in synthetic datasets has direct positive effect on machine learning model. The model applies kernel base Sup- detection accuracy while increases false alarm rate in com- port VectorMachine and a novel weighting measure based on pare to the original dataset. application library calls to detect OS X malware. For training and evaluating the model, a dataset with a combination of 152 Keywords OS X malware detection · RBF–SVM · Mach-O · malware and 450 benign were created. Using common super- Supervised classification · Cyber threat intelligence vised Machine Learning algorithm on the dataset, we obtain B Ali Dehghantanha 1 Introduction [email protected] Hamed Haddad Pajouh Malicious softwares (malware) are a serious threat to the [email protected] security of computing systems [1,2]. Kaspersky and Labs Raouf Khayami alone detected more than 121,262,075 unique malware in [email protected] 2015 [3] while Panda Labs predicted that half of security Kim-Kwang Raymond Choo issues are directly related to malware infections [4], McAffe [email protected] reported a rise of 744% OS X malware over 2015 in 2016 [5]. The increasing Mac OS X market size (second after 1 Department of Computer Engineering and Information, Microsoft Windows [6] and its fast adoption rate motivate Technology, Shiraz University of Technology, Shiraz, Iran cyber threat actors to shift their focus to developing OS X 2 School of Computing, Science and Engineering, University of malware. The “myth” that OS X is a more secure system Salford, Salford, UK only further increases malware success rate. For example, 3 Department of Information Systems and Cyber Security, The OS X Flashback Trojan successfully infected over 700,000 University of Texas at San Antonio, San Antonio, TX 78249, USA machines in 2012 [7]. Security researchers have developed a wide range of anti- 4 School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA 5095, malware tools and malware detection techniques in their Australia battle against the ever increasing malware and potentially 123 H. H. Pajouh et al. Fig. 1 Research methodology malicious programs, including approaches based on super- The False Alarm Rate (FAR) is the rate that a classifier vised and unsupervised machine learning techniques for wrongly detected a goodware as malware and computed as: malware detection [7]. In approaches using supervised tech- niques, tagged datasets of malicious and benign programs are FP FAR = (2) required for training. Approaches using unsupervised tech- FP + TN niques generally do not require the separation of malware and goodware, and programs are generally classified based Our research methodology is presented in Fig. 1. on observable similarities or differences [8]. The organization of this paper is as follows. Section 2 While there have been promising results on the use of discusses related research, and Sect. 3 describes our dataset machine learning in Windows and Android malware detec- development. Sections 4 and 5 presents our malware classi- tion [9,10], there has been no prior work on using machine fication and a discussion of this work, respectively. Finally, learning for OS X malware detection. This could be, per- we conclude in the last section. haps, due to the lack of a suitable research dataset and the difficulties in collecting OS X malware. In this paper, we propose a machine learning model to 2 Literature review detect OS X malware based on the Radial Base Function (RBF) in the SVM technique. This provides us a novel mea- Machine learning techniques have been used for malware sure based on application’s library calling to detect malware detection. Nauman et al. [11] used game-theoretic rough sets from benign samples. We then propose a new weighting mea- (GTRS) and information-theoretic rough sets (ITRS) to show sure for classifying OS X goodware and malware based on that a three-way decision-making approach (acceptance, the frequency of library calling. This measure weights each rejection and deferment) outperforms two-way (accept, library based on its frequency of occurrence in malware and reject) decision-making techniques in network flow analysis benign applications. for Windows malware detection. Fattori et al. [12]devel- These datasets are then evaluated using four main clas- oped an unsupervised system-centric behavioral Windows sification techniques, namely: Nave Bayes, Bayesian Net, malware detection model with reportedly 90% in accuracy. Multi Layer Perceptron (MLP), Decision Tree-J48, and Their approach monitors interactions between applications Weighted Radial Basis Function Kernels-Based Support and underlying Windows operating system for classifica- Vector Machine (Weighted-RBFSVM). The following per- tion of malicious applications. Mohaisen et al. [13] proposed formance indicators are used for evaluating the performance an unsupervised behavioral based (dynamic) Windows mal- of our machine learning classifiers: ware classification technique by monitoring file system and True Positive (TP): shows the ratio of goodware classified memory interactions and achieved more than 98% preci- as benign; sion. Huda et al. [14] proposed a hybrid framework for True Negative (TN): shows the ratio of malware correctly malware detection based on programs interactions with Win- detected as malware; dows Application Program Interface (API) using Support False Positive (FP): shows that the ratio of malware files Vector Machines (SVM) wrappers and statistical measures identified as benign; and and obtained over 96% detection accuracy. False Negative (FN): shows the ratio of goodware classified Nissim et al. [15] proposed an SVM-based Active Learn- as malware. ing framework to detect novel Windows malware using Accuracy (ACC): measures the ratio that a classifier cor- supervised learning with an average accuracy of 97%. rectly detected malware and benign samples (goodware), and Damodaran et al. [16] utilized Hidden Markov Models is computed using following formula: (HMMs) to trace APIs and Opcodes of Windows malware sequences and developed a fully dynamic approach for mal- TP + TN ware detection based on API calls with over 90% accuracy. ACC = (1) FN + TP + FP + TN Mangialardo and Duarte [17] proposed a hybrid supervised 123 Intelligent OS X malware threat detection with code inspection machine learning model using C5.0 and Random Forests (RF) algorithms with an accuracy of 93.00% for detecting Linux malware. Due to the increasing use of smart devices such as Android and iOS devices, there has been a corresponding increase in the number of Android and iOS malware [18–20]. Suarez- Tangil et al. [21], for example, proposed an Android malware detection model. Yerima et al. [22] utilized ensemble learn- ing techniques for Android malware detection and reportedly had an accuracy rate between 97.33 and 99%, with a rela- tively low false alarm rate (less than 3%). Saracino et al. [23] designed a system called MADAM which is a host-based Android malware detection. The MADAM was evaluated using real world apps. OS X malware has also been on the increase [24], but there is limited published research in OS X malware analysis and detection. For example, a small number of researchers have developed OS X malware and Rootkit detection tech- niques, and malware detectors by tracing suspicious activities in memory (like unwanted access, read, write and execute) [25–27]. However, applying machine learning to detect OS X malware is limited to the Walkup approach [28], which utilized Information Gain (IG) to select effective features for supervised classification of OS X malware.
Recommended publications
  • 706 What's New in Security 07 FINAL.Key
    System Frameworks #WWDC16 What’s New in Security Session 706 Lucia Ballard Secure Transports Engineering Manager Simon Cooper Trusted Execution Engineering Manager © 2016 Apple Inc. All rights reserved. Redistribution or public display not permitted without written permission from Apple. What’s New in Security? What’s New in Security? Network Security What’s New in Security? Network Security Cryptography APIs What’s New in Security? Network Security Cryptography APIs Platform Security on macOS What’s New in Network Security Lucia Ballard Secure Transports Engineering Manager Secure Communications Secure Communications HTTPS is the new HTTP • Confidentiality • Data integrity Secure Communications HTTPS is the new HTTP • Confidentiality • Data integrity Not all HTTPS is created equal App Transport Security Current standards App Transport Security Current standards For NSURLSession and NSURLConnection APIs App Transport Security Current standards For NSURLSession and NSURLConnection APIs • TLS v1.2 App Transport Security Current standards For NSURLSession and NSURLConnection APIs • TLS v1.2 • Strong crypto—AES-128 and SHA-2 App Transport Security Current standards For NSURLSession and NSURLConnection APIs • TLS v1.2 • Strong crypto—AES-128 and SHA-2 • Forward secrecy—ECDHE App Transport Security Current standards For NSURLSession and NSURLConnection APIs • TLS v1.2 • Strong crypto—AES-128 and SHA-2 • Forward secrecy—ECDHE Exceptions—global or for particular domains App Transport Security Enforcement App Transport Security Enforcement Enforced
    [Show full text]
  • Webobjects Bundle Reference
    WebObjects Bundle Reference 2006-10-03 Times is a registered trademark of Apple Computer, Inc. Heidelberger Druckmaschinen AG, © 2006 Apple Computer, Inc. available from Linotype Library GmbH. All rights reserved. Simultaneously published in the United States and Canada. No part of this publication may be Even though Apple has reviewed this document, reproduced, stored in a retrieval system, or APPLE MAKES NO WARRANTY OR transmitted, in any form or by any means, REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH RESPECT TO THIS mechanical, electronic, photocopying, DOCUMENT, ITS QUALITY, ACCURACY, recording, or otherwise, without prior MERCHANTABILITY, OR FITNESS FOR A written permission of Apple Computer, Inc., PARTICULAR PURPOSE. AS A RESULT, THIS DOCUMENT IS PROVIDED “AS IS,” AND with the following exceptions: Any person YOU, THE READER, ARE ASSUMING THE is hereby authorized to store documentation ENTIRE RISK AS TO ITS QUALITY AND ACCURACY. on a single computer for personal use only IN NO EVENT WILL APPLE BE LIABLE FOR and to print copies of documentation for DIRECT, INDIRECT, SPECIAL, INCIDENTAL, personal use provided that the OR CONSEQUENTIAL DAMAGES documentation contains Apple’s copyright RESULTING FROM ANY DEFECT OR INACCURACY IN THIS DOCUMENT, even if notice. advised of the possibility of such damages. The Apple logo is a trademark of Apple THE WARRANTY AND REMEDIES SET FORTH ABOVE ARE EXCLUSIVE AND IN Computer, Inc. LIEU OF ALL OTHERS, ORAL OR WRITTEN, EXPRESS OR IMPLIED. No Apple dealer, agent, Use of the “keyboard” Apple logo or employee is authorized to make any (Option-Shift-K) for commercial purposes modification, extension, or addition to this without the prior written consent of Apple warranty.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Video Capture 3-In-1 Video Capture
    Model: NV100C Video Capture 3-in-1 video capture Quick Start Guide 1 Table of Contents Overview ........................................................................................... 3 Package Contents ................................................................................................. 3 System Requirements ........................................................................................... 3 Use on Mac OS .................................................................................. 4 Hardware Installation ........................................................................................... 4 Driver Installation ................................................................................................. 4 Capture Video on QuickTime Player ..................................................................... 4 Use on Windows PC/Laptop ............................................................... 7 Hardware Installation ........................................................................................... 7 Driver Installation ................................................................................................. 7 Capture Video on CyberLink PowerDirector ......................................................... 7 Capture Video on VivaStation............................................................................. 10 Use on Android Device .................................................................... 12 Capture Video on VivaCAP ................................................................................
    [Show full text]
  • OS X Mavericks
    OS X Mavericks Core Technologies Overview October 2013 Core Technologies Overview 2 OS X Mavericks Contents Page 4 Introduction Page 5 System Startup BootROM EFI Kernel Drivers Initialization Address Space Layout Randomization (ASLR) Compressed Memory Power Efficiency App Nap Timer Coalescing Page 10 Disk Layout Partition Scheme Core Storage File Systems Page 12 Process Control Launchd Loginwindow Grand Central Dispatch Sandboxing GateKeeper XPC Page 19 Network Access Ethernet Wi-Fi Multihoming IPv6 IP over Thunderbolt Network File Systems Access Control Lists Directory Services Remote Access Bonjour Page 25 Document Lifecycle Auto Save Automatic Versions Document Management Version Management iCloud Storage Core Technologies Overview 3 OS X Mavericks Page 28 Data Management Spotlight Time Machine Page 30 Developer Tools Xcode LLVM Instruments Accelerate Automation WebKit Page 36 For More Information Core Technologies Overview 4 OS X Mavericks Introduction With more than 72 million users—consumers, scientists, animators, developers, and system administrators—OS X is the most widely used UNIX® desktop operating system. In addition, OS X is the only UNIX environment that natively runs Microsoft Office, Adobe Photoshop, and thousands of other consumer applications—all side by side with traditional command-line UNIX applications. Tight integration with hardware— from the sleek MacBook Air to the powerful Mac Pro—makes OS X the platform of choice for an emerging generation of power users. This document explores the powerful industry standards and breakthrough innovations in the core technologies that power Apple’s industry-leading user experiences. We walk you through the entire software stack, from firmware and kernel to iCloud and devel- oper tools, to help you understand the many things OS X does for you every time you use your Mac.
    [Show full text]
  • (Software CD/DVD Bundles) APPLE COMPUTER
    Apple Computer, Inc. iTunes 7 and QuickTime 7 Bundling Agreement (Software CD/DVD Bundles) APPLE COMPUTER, INC. Software Licensing Department 12545 Riata Vista Circle MS 198-3SWL Austin, TX 78727 E-Mail Address: [email protected] Licensee (Company Name): _____________________________________________ (Must be the copyright owner of products listed in Exhibit A, paragraph 2) Individual to Contact: _____________________________________________ Street Address: _____________________________________________ City: __________________________________ State: ____________________ Zip/Postal Code: ____________________ Country: ________________________ Telephone Number: ____________________________________________ Fax Number: _____________________________________________ E-Mail Address: (Required) ______________________________________________ Licensee’s Site: ______________________________________________ (provide name and address of Licensee's page/URL on the World Wide Web, if applicable Agreement Apple Computer, Inc. ("Apple") and Licensee agree that the terms and conditions of this Agreement shall govern Licensee's use and distribution of the iTunes and QuickTime Software, as defined below. 1. Definitions 1.1 “Bundle” means the bundle(s) identified in Exhibit A distributed by or on behalf of Licensee. 1.2 “Effective Date” means the date on which Apple executed this Agreement as set forth on the signature page. SWL263-091506 Page 1 1.3 “Software” means the iTunes and QuickTime Software identified in Exhibit A, and any updates thereto provided
    [Show full text]
  • Binaries Should Be Mach-O
    Mac OS X Programming Guidelines 11/28/01 7:56 PM Technical: Developer Documentation: Technical Notes CONTENTS Mac OS X is designed to be a powerful, robust, and versatile operating system. For it Binaries should be Mach-O to live up to its full potential, however, requires Run performance tools on your binary adherence to some specific programming Don't use processor resources unless you have to Use Carbon Events in your Application practices. Avoid using resource forks Use file extensions [Nov 26 2001] Make your code volume-format independent Use bundled resources and Unicode-savvy APIs Investigate using path-based file-system APIs Cocoa: The quickest way to developing the next killer application for Mac OS X Be judicious using C++ for new development References Downloadables Please keep the following points in mind when developing for Mac OS X: Binaries should be Mach-O Mach-O is the native executable format of Mac OS X. This has several implications for code that is compiled into that format, and for code that isn't. Mach-O code gets the most efficient access to all Mac OS X technologies and the best possible integration with system software. Code that isn't Mach-O doesn't. Mach-O is supported by Apple's development tools, CodeWarrior Pro 7 and Absoft Pro Fortran for Mac OS X at the present time. Others are working on it as well. As a developer you have several options for moving to Mach-O: 1. Use Apple Development tools: Apple delivers a complete suite of development tools for Mac OS X: Mach-O code generation with C, C++ and Objective-C languages, complete Carbon, Cocoa and I/O Kit support, full Java development support, Aqua interface design tools, along with debugging and performance analysis tools.
    [Show full text]
  • ZEN15-Managing Macintosh OS-X with Novell Zenworks Configuration Management 11.2 / Lecture
    Managing Macintosh OS-X with Novell ZCM 11.2 Lecture Novell Training Services www.novell.com ZEN15 ATT LIVE 2012 LAS VEGAS Novell, Inc. Copyright 2012-ATT LIVE-1-HARDCOPY PERMITTED. NO OTHER PRINTING, COPYING, OR DISTRIBUTION ALLOWED. Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • Nsbundle Class Reference
    NSBundle Class Reference Inherits from NSObject Conforms to NSObject (NSObject) Framework /System/Library/Frameworks/Foundation.framework Availability Available in iOS 2.0 and later. Declared in NSBundle.h Companion guides Bundle Programming Guide Resource Programming Guide Related sample code BubbleLevel International Mountains iPhoneCoreDataRecipes oalTouch PVRTextureLoader Overview An NSBundle object represents a location in the file system that groups code and resources that can be used in a program. NSBundle objects locate program resources, dynamically load and unload executable code, and assist in localization. You build a bundle in Xcode using one of these project types: Application, Framework, plug-ins. Although bundle structures vary depending on the target platform and the type of bundle you are building, the NSBundle class hides this underlying structure in most (but not all) cases. Many of the methods you use to load resources from a bundle automatically locate the appropriate starting directory and look for resources in known places. For information about application bundle structures (for Mac OS X and iOS), see Bundle Programming Guide. For information about the structure of framework bundles, see Framework Programming Guide. For information about the structure of Mac OS X plug-ins, see Code Loading Programming Topics. For additional information about how to load nib files and images in a Mac OS X application, see NSBundle Additions Reference. For information about how to load nib files in an iOS application, see NSBundle UIKit Additions Reference. Unlike some other Foundation classes with corresponding Core Foundation names (such as NSString and CFString), NSBundle objects cannot be cast (“toll-free bridged”) to CFBundle references.
    [Show full text]
  • Much More Than a Text Reader... It's an Integrated Literacy
    Much more than a text reader... it’s an Integrated Literacy Solution Kurzweil 3000 supports the concept of Universal Design for Learning as a powerful reading, writing, test-taking, and learning tool that can make curriculum accessible for all students. Students who have the cognitive ability but not the literacy skills to learn from grade-level content, such as students with learning disabilities, and second language learners are among the many student populations that benefit from the use of Kurzweil 3000. As an integrated literacy software, Kurzweil 3000 can read text aloud to students from digital and print formats while providing the scaffolded support necessary to allow individual success. Kurzweil 3000 Version 12 for Windows features expanded writing support including an enhanced writing toolbar that integrates with most process writing models and smoothly transitions learners from pre-writing through their final draft. Specific to Kurzweil3000 Version 12 for Windows Network: · Text translation on-the-fly with Google® Translate · Ability to read MathML through a partnership with Design Science, Inc. · Expanded eContent support through Internet Explorer® · Additional digital file support for PDF, Daisy 2, Daisy 3, and NIMAS · A Picture Dictionary containing 1,300+ images supporting English and Spanish · Human Pronunciations for over 64,000 words from American Heritage® Dictionary · Comprehensive set of brainstorm and outline writing templates Specific to Kurzweil3000 Version 12 for Windows Web License Edition: · Enables anytime,
    [Show full text]
  • Fireware V12.6.3 Release Notes (PDF)
    Fireware v12.6.3 Release Notes Supported Devices Firebox T20, T40, T80, M270, M370, M400, M440, M470, M500, M570, M670, M4600, M4800, M5600, M5800 FireboxV, Firebox Cloud, WatchGuard AP Release Date 15 December 2020 Release Notes Revision 21 April 2021 Fireware OS Build 633764 WatchGuard System Manager Build 632680 WatchGuard AP Firmware AP120, AP320, AP322: 8.8.3-12 AP125, AP225W, AP325, AP327X, AP420: 8.9.0-63 Introduction Introduction Fireware v12.6.3 is a maintenance release for Firebox T20, T40, T80, Firebox M Series (except M200 and M300), FireboxV, and Firebox Cloud appliances. This release features important bug fixes and enhancements. For a full list of the enhancements in this release, see Enhancements and Resolved Issues or review the What's New in Fireware v12.6.3 PowerPoint. Fireware v12.6.x is based on Linux kernel 4.14. On some Firebox models, Linux kernel 4.14 does not provide sufficient quality and performance. Because of this, Fireware v12.6.x is not currently available for Firebox T10, T15, T30, T35, T55, T70, M200, and M300. We are continuing to work to bring all models to a common kernel in a future release. For more information, see this Knowledge Base article. 2 WatchGuard Technologies, Inc. Before You Begin Before You Begin Before you install this release, make sure that you have: l A supported WatchGuard Firebox. This device can be a WatchGuard Firebox T20, T40, T80, M270, M370, M400, M440, M470, M500, M570, M670, M4600, M4800, M5600, M5800, Firebox Cloud, or FireboxV. You cannot install Fireware v12.6.3 on any other Firebox model.
    [Show full text]